SlideShare a Scribd company logo
1 of 30
Plings: Promoting Positive Activities  in a web 2.0 world Steven Flower 27 November 2008
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Web 1.0
Web 2.0
 
 
 
 
 
The Pilot Local Authorities North-East Durham, Gateshead, Newcastle, South Tyneside North-West Blackburn, Blackpool, Halton, Knowsley, Bolton, Salford London Lewisham, Islington Yorkshire & Humberside Doncaster, Hull, Wakefield Midlands Birmingham, Walsall, Coventry, Leicester, Nottingham 
 
 
 
 
 
Web 3.0?
 

More Related Content

Viewers also liked

C:\Fakepath\Proyectos De Aula
C:\Fakepath\Proyectos De AulaC:\Fakepath\Proyectos De Aula
C:\Fakepath\Proyectos De AulaPedro Aguirre
 
C:\Fakepath\ResoluciòN De Problemas ExposiciòN
C:\Fakepath\ResoluciòN De Problemas ExposiciòNC:\Fakepath\ResoluciòN De Problemas ExposiciòN
C:\Fakepath\ResoluciòN De Problemas ExposiciòNPedro Aguirre
 

Viewers also liked (6)

C:\Fakepath\Proyectos De Aula
C:\Fakepath\Proyectos De AulaC:\Fakepath\Proyectos De Aula
C:\Fakepath\Proyectos De Aula
 
C:\Fakepath\ResoluciòN De Problemas ExposiciòN
C:\Fakepath\ResoluciòN De Problemas ExposiciòNC:\Fakepath\ResoluciòN De Problemas ExposiciòN
C:\Fakepath\ResoluciòN De Problemas ExposiciòN
 
My 7 wonders
My 7 wondersMy 7 wonders
My 7 wonders
 
My 7 wonders
My 7 wondersMy 7 wonders
My 7 wonders
 
O valor das pequenas coisas 1
O valor das pequenas coisas 1O valor das pequenas coisas 1
O valor das pequenas coisas 1
 
Legal Advice Help
Legal Advice HelpLegal Advice Help
Legal Advice Help
 

More from Opportunity Links

Planning To Inform - The strategic importance of Families Information Services
Planning To Inform - The strategic importance of Families Information ServicesPlanning To Inform - The strategic importance of Families Information Services
Planning To Inform - The strategic importance of Families Information ServicesOpportunity Links
 
Opportunity Links Matrix Accreditation Review Report
Opportunity Links Matrix Accreditation Review ReportOpportunity Links Matrix Accreditation Review Report
Opportunity Links Matrix Accreditation Review ReportOpportunity Links
 
Later Life Forum briefing paper
Later Life Forum briefing paperLater Life Forum briefing paper
Later Life Forum briefing paperOpportunity Links
 
Youth work and social networking - Findings from research
Youth work and social networking - Findings from researchYouth work and social networking - Findings from research
Youth work and social networking - Findings from researchOpportunity Links
 
Positive outcomes for youth through social media
Positive outcomes for youth through social mediaPositive outcomes for youth through social media
Positive outcomes for youth through social mediaOpportunity Links
 
Fear and awe of the digital native
Fear and awe of the digital nativeFear and awe of the digital native
Fear and awe of the digital nativeOpportunity Links
 
Changing the way we communicate
Changing the way we communicateChanging the way we communicate
Changing the way we communicateOpportunity Links
 
Using the web to promote positive activities for young people
Using the web to promote positive activities for young peopleUsing the web to promote positive activities for young people
Using the web to promote positive activities for young peopleOpportunity Links
 

More from Opportunity Links (11)

Information Matters
Information MattersInformation Matters
Information Matters
 
Planning To Inform - The strategic importance of Families Information Services
Planning To Inform - The strategic importance of Families Information ServicesPlanning To Inform - The strategic importance of Families Information Services
Planning To Inform - The strategic importance of Families Information Services
 
Opportunity Links Matrix Accreditation Review Report
Opportunity Links Matrix Accreditation Review ReportOpportunity Links Matrix Accreditation Review Report
Opportunity Links Matrix Accreditation Review Report
 
Later Life Forum briefing paper
Later Life Forum briefing paperLater Life Forum briefing paper
Later Life Forum briefing paper
 
Youth work and social networking - Findings from research
Youth work and social networking - Findings from researchYouth work and social networking - Findings from research
Youth work and social networking - Findings from research
 
Positive outcomes for youth through social media
Positive outcomes for youth through social mediaPositive outcomes for youth through social media
Positive outcomes for youth through social media
 
Fear and awe of the digital native
Fear and awe of the digital nativeFear and awe of the digital native
Fear and awe of the digital native
 
Changing the way we communicate
Changing the way we communicateChanging the way we communicate
Changing the way we communicate
 
Using the web to promote positive activities for young people
Using the web to promote positive activities for young peopleUsing the web to promote positive activities for young people
Using the web to promote positive activities for young people
 
The Information Challenge
The Information ChallengeThe Information Challenge
The Information Challenge
 
evince Roadshow
evince Roadshowevince Roadshow
evince Roadshow
 

Recently uploaded

ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 

Recently uploaded (20)

ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

Promoting Positive Activities In A Web2.0 World